|
||||||
|
||
|
Home > Secret software |
Related keywords: secret chamber, secret passwords, Surf Secret, secret key encryption, secret allies, The Secret Garden, invisible secret, secret pictures, secret diary, secret hotkey |
|
|
181. | CopyQuick 1.0 (bobcatutilities.com) | ||
CopyQuick is a utility to repeatedly copy selected files between directories quickly and easily. Once the list of files and directories that you wish to copy has been created it can be saved in a file and loaded again later for repeated use. Once you have created and save you file list you can access it and | |||
Updated: 3, 2005 | Rating: 0 | Author: Alec Ford | Size: 210 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
182. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
183. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, or entire drives, floppy disks, CDs/DVDs, USB flash drives, etc. East-Tec Eraser 2006 offers full support for popular browsers (Internet Explorer, Netscape | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
184. | East-Tec File Shredder 1.0 (east-tec.com) | ||
and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
185. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
186. | Email Spy Pro 4.5 (email-spy.biz) | ||
computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy Control Panel. Unique feature of Email | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
187. | EmailObserver 5.2.2 (softsecurity.com) | ||
invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
188. | FastFolder by BB 3.3.0 (dogkennels.net) | ||
is a FREE full working version. There are NO registry changes nor secret files made. FastFolder by BB contains no Spyware or AdWare, and is totally non-intrusive. FastFolder by BB allows quick access to twelve selectable folders from a tray icon. It uses minimum system resources, and is a FREE full working version. FastFolder by BB contains no Spyware or AdWare and makes NO registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Madigan | Size: 94 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
189. | File Monster 2.6.7 (nstarsolutions.com) | ||
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
190. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
191. | FileMap by BB 4.0.4 (dogkennels.net) | ||
be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
192. | MySecretFolder 3.0 (winability.com) | ||
programs. Highly customizable and user-friendly. http://www.my-secret-folder.com/ MySecretFolder - You can hide or protect with a password your personal folder with private files and documents, on both the NTFS and FAT/FAT32 volumes. Very easy to use. Supports the stealth operation and hot key | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 402 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
193. | Free History Cleaner 2.82 (aidsoft.com) | ||
issues. This program is equiped with features such as cleaning the secret index.dat file, typed url, cookies, cache, most recently used data among other things. The all new version of Free History Cleaner comes with tons of new features and benfits. New web page sections like Interactive User Forums, helps you answer a lot of your online privacy | |||
Updated: 9, 2005 | Rating: 0 | Author: Abhishek Lodha | Size: 444 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
194. | Ghost Keylogger 3.80 (keylogger.net) | ||
every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
195. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
196. | Hara-Kiri 2.02 (cyteg.com) | ||
Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of certain keys while Windows is starting up! And secrets silently and secretly are deletet from disc... 2. You are under suspicion that during your absence your wife/husband/colleagues/mammy (to underline the required) | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
197. | Harry Potter Clock 2.0 (pxcompany.com) | ||
deadly Chamber of Secrets has opened, but no one even believes it exists. Voices whisper in your head, a monster is lurking the halls and a deadly clock ticks life away. Install this Harry Potter clock and see Harry Potter and his friends, hear the magical sounds of Hogwarts School of Witchcraft and Wizardry and enjoy the mysterious clock showing precise time right on your computer | |||
Updated: 6, 2005 | Rating: 168 | Author: Parallaxis Software | Size: 1537 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
198. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
199. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
200. | IIPwr Package 2.00 (iipwr.com) | ||
Ever wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
201. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
This password recovery tool designed for viewing and cleaning the secret data stored by Internet Explorer. This includes managing passwords for protected sites, user passwords on forms, Content Advisor password and autocomplete | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
202. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
203. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
204. | Keep It (a) Secret! 2002B (amateur-invest.com) | ||
remember one, and all the other will be revealed. Use "Keep It (a) Secret". Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Michael | Size: 390 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
205. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an optional | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
206. | Lock My PC 3.4 (fspro.net) | ||
the TaskTray icon to lock down your PC. Stop worrying that your secrets will be revealed! Download FREE trial | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
207. | LockBox 2.11 (locksoft.net) | ||
The LockBox looks and acts much like a regular windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a strong encryption algorithm. Files can be run or modified from directly within the LockBox, without compromising security. Large files can optionally be | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
208. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
209. | Stauri Orataur 1.1 (victauri.com) | ||
Stauri Orataur is a simple but effective knowledge bot. Ask it a question and it will supply a straightforward answer. No long lists of web addresses and no tedious secondary search through hundreds of web pages returned by your initial question. Orataur uses Victauri's Stauri(tm) technology to filter | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Triggs | Size: 926 kb | Freeware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
210. | fitW (fine tuning of Windows) 4.0.0.4000 (mtsv.fromru.com) | ||
The utility for fine tuning of Windows 9x/Me/2000/XP. More than 250 most necessary and often used options. Exists a possibility of saving and loading a necessary configuration, changing and uninstalling of program, changing of autorunning program, etc. Automatic determination of version of system. Depending | |||
Updated: 9, 2005 | Rating: 0 | Author: MTsv DN | Size: 193 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Secret software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|